First published: Wed Apr 21 2021(Updated: )
An issue was discovered in Bento4 through v1.6.0-637. A NULL pointer dereference exists in the function AP4_StszAtom::GetSampleSize() located in Ap4StszAtom.cpp. It allows an attacker to cause Denial of Service.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Bento4 | <=1.6.0-637 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-23912 has been classified as a high severity vulnerability due to its potential to cause Denial of Service.
CVE-2020-23912 exploits a NULL pointer dereference in the AP4_StszAtom::GetSampleSize() function, leading to application crashes.
Bento4 versions up to and including 1.6.0-637 are affected by CVE-2020-23912.
To mitigate CVE-2020-23912, upgrade Bento4 to a version later than 1.6.0-637 where the vulnerability is resolved.
Yes, a patch for CVE-2020-23912 is available in the newer versions of Bento4, which users should apply immediately.